• Title/Summary/Keyword: Threat modeling

Search Result 130, Processing Time 0.023 seconds

A CYBER SECURITY RISK ASSESSMENT FOR THE DESIGN OF I&C SYSTEMS IN NUCLEAR POWER PLANTS

  • Song, Jae-Gu;Lee, Jung-Woon;Lee, Cheol-Kwon;Kwon, Kee-Choon;Lee, Dong-Young
    • Nuclear Engineering and Technology
    • /
    • v.44 no.8
    • /
    • pp.919-928
    • /
    • 2012
  • The applications of computers and communication system and network technologies in nuclear power plants have expanded recently. This application of digital technologies to the instrumentation and control systems of nuclear power plants brings with it the cyber security concerns similar to other critical infrastructures. Cyber security risk assessments for digital instrumentation and control systems have become more crucial in the development of new systems and in the operation of existing systems. Although the instrumentation and control systems of nuclear power plants are similar to industrial control systems, the former have specifications that differ from the latter in terms of architecture and function, in order to satisfy nuclear safety requirements, which need different methods for the application of cyber security risk assessment. In this paper, the characteristics of nuclear power plant instrumentation and control systems are described, and the considerations needed when conducting cyber security risk assessments in accordance with the lifecycle process of instrumentation and control systems are discussed. For cyber security risk assessments of instrumentation and control systems, the activities and considerations necessary for assessments during the system design phase or component design and equipment supply phase are presented in the following 6 steps: 1) System Identification and Cyber Security Modeling, 2) Asset and Impact Analysis, 3) Threat Analysis, 4) Vulnerability Analysis, 5) Security Control Design, and 6) Penetration test. The results from an application of the method to a digital reactor protection system are described.

A Study on the Working Effect of UAV Hitting Mine Artillery (갱도 포병 타격 시 무인항공기 운용 효과에 관한 연구)

  • Jeong, Young-Ho;Shin, Ki-Tae;Chang, Tai-Woo;Park, Jin-Woo
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.175-182
    • /
    • 2008
  • The enemy will attempt to destroy our troop's core facilities using various fire supports at the beginning of war. Among these fire supports, artillery is given the most deal of weight and mine artillery is a great threat to our troops because it has a superior predominance on the ability of survival. Our troops are planning to introduce UAV (Unmanned Aerial Vehicle) to overcome these difficulties. A study about hitting mine artillery has been developed inside the military field only. However, these studies had been mostly qualitative analyses, thus having limitations in the aspects of non objectiveness and simplicity. We propose a new method to evaluate about working effect of UAV hitting mine artillery. We studied on hitting mine artillery in a quantitative way using CA (Cellular Automata) simulation.

  • PDF

Potential impact of climate change on plant invasion in the Republic of Korea

  • Adhikari, Pradeep;Jeon, Ja-Young;Kim, Hyun Woo;Shin, Man-Seok;Adhikari, Prabhat;Seo, Changwan
    • Journal of Ecology and Environment
    • /
    • v.43 no.4
    • /
    • pp.352-363
    • /
    • 2019
  • Background: Invasive plant species are considered a major threat to biodiversity, ecosystem functioning, and human wellbeing worldwide. Climatically suitable ranges for invasive plant species are expected to expand due to future climate change. The identification of current invasions and potential range expansion of invasive plant species is required to plan for the management of these species. Here, we predicted climatically suitable habitats for 11 invasive plant species and calculated the potential species richness and their range expansions in different provinces of the Republic of Korea (ROK) under current and future climate change scenarios (RCP 4.5 and RCP 8.5) using the maximum entropy (MaxEnt) modeling approach. Results: Based on the model predictions, areas of climatically suitable habitats for 90.9% of the invasive plant species are expected to retain current ecological niches and expand to include additional climatically suitable areas under future climate change scenarios. Species richness is predicted to be relatively high in the provinces of the western and southern regions (e.g., Jeollanam, Jeollabuk, and Chungcheongnam) under current climatic conditions. However, under future climates, richness in the provinces of the northern, eastern, and southeastern regions (e.g., Seoul, Incheon, Gyeonggi, Gyeongsangnam, Degue, Busan, and Ulsan) is estimated to increase up to 292%, 390.75%, and 468.06% by 2030, 2050, and 2080, respectively, compared with the current richness. Conclusions: Our study revealed that the rates of introduction and dispersion of invasive plant species from the western and southern coasts are relatively high and are expanding across the ROK through different modes of dispersion. The negative impacts on biodiversity, ecosystem dynamics, and economy caused by invasive plant species will be high if preventive and eradication measures are not employed immediately. Thus, this study will be helpful to policymakers for the management of invasive plant species and the conservation of biodiversity.

Factors Affecting the Information Security Awareness and Perceived Information Security Risk of Employees of Port Companies (항만기업 종사자들의 정보보안인식과 지각된 정보보안위험에 영향을 미치는 요인)

  • Chang, Myung-Hee;Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.36 no.3
    • /
    • pp.261-271
    • /
    • 2012
  • The purpose of the present study is to empirically examine factors that affect the information security awareness and perceived information security risk of employees of port companies. In particular, in order to identify factors that affect the perceived information security risks, we investigated the relation of assets, threats, and vulnerabilities to it, using the risk analysis methodology. With A total of 252 valid questionnaires, we also performed the structural equation modeling analysis using AMOS. It was found that first, there was no meaningful relationship between the information assets and the perceived information security risk in the case of employees of port companies. Second, threats and vulnerabilities turned out to have positive influences on the perceived information security risk. Finally, there was a positive relationship not only between the information security awareness and the information security education, but also between the information security awareness and the intention of information security. However, there was no meaningful relationship between the information security concern and the information security awareness.

A one-dimensional model for impact forces resulting from high mass, low velocity debris

  • Paczkowski, K.;Riggs, H.R.;Naito, C.J.;Lehmann, A.
    • Structural Engineering and Mechanics
    • /
    • v.42 no.6
    • /
    • pp.831-847
    • /
    • 2012
  • Impact from water-borne debris during tsunami and flood events pose a potential threat to structures. Debris impact forces specified by current codes and standards are based on rigid body dynamics, leading to forces that are dependent on total debris mass. However, shipping containers and other debris are unlikely to be rigid compared to the walls, columns and other structures that they impact. The application of a simple one-dimensional model to obtain impact force magnitude and duration, based on acoustic wave propagation in a flexible projectile, is explored. The focus herein is on in-air impact. Based on small-scale experiments, the applicability of the model to predict actual impact forces is investigated. The tests show that the force and duration are reasonably well represented by the simple model, but they also show how actual impact differs from the ideal model. A more detailed three-dimensional finite element model is also developed to understand more clearly the physical phenomena involved in the experimental tests. The tests and the FE results reveal important characteristics of actual impact, knowledge of which can be used to guide larger scale experiments and detailed modeling. The one-dimensional model is extended to consider water-driven debris as well. When fluid is used to propel the 1-D model, an estimate of the 'added mass' effect is possible. In this extended model the debris impact force depends on the wave propagation in the two media, and the conditions under which the fluid increases the impact force are discussed.

File Analysis Data Auto-Creation Model For Peach Fuzzing (Peach 퍼징을 위한 파일 분석 데이터 자동 생성 모델)

  • Kim, Minho;Park, Seongbin;Yoon, Jino;Kim, Minsoo;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.327-333
    • /
    • 2014
  • The rapid expansion of the software industry has brought a serious security threat and vulnerability. Many softwares are constantly attacked by exploit codes using security vulnerabilities. Smart fuzzing is automated method to find software vulnerabilities. However, Many resources are consumed in fuzzing, because the fuzzing needs to create data model for target software and to analyze a data file and software binary. Therefore, The automated method for efficient smart fuzzing is needed to develop the automated data model. In this paper, through analysing the input file format and optimizing the data structure, we propose an efficient data modeling framework for smart fuzzing and implement the framework for detect software vulnerabilities.

Development of Security Anomaly Detection Algorithms using Machine Learning (기계 학습을 활용한 보안 이상징후 식별 알고리즘 개발)

  • Hwangbo, Hyunwoo;Kim, Jae Kyung
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.1
    • /
    • pp.1-13
    • /
    • 2022
  • With the development of network technologies, the security to protect organizational resources from internal and external intrusions and threats becomes more important. Therefore in recent years, the anomaly detection algorithm that detects and prevents security threats with respect to various security log events has been actively studied. Security anomaly detection algorithms that have been developed based on rule-based or statistical learning in the past are gradually evolving into modeling based on machine learning and deep learning. In this study, we propose a deep-autoencoder model that transforms LSTM-autoencoder as an optimal algorithm to detect insider threats in advance using various machine learning analysis methodologies. This study has academic significance in that it improved the possibility of adaptive security through the development of an anomaly detection algorithm based on unsupervised learning, and reduced the false positive rate compared to the existing algorithm through supervised true positive labeling.

Resupply Behavior Modeling in Small-unit Combat Simulation using Decision Trees (소부대 전투 모의를 위한 의사결정트리 기반 재보급 행위 모델링)

  • Seil An;Sang Woo Han
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.9-21
    • /
    • 2023
  • The recent conflict between Russia and Ukraine underscores the significant of military logistics support in modern warfare. Military logistics support is intricate and specialized, and traditionally centered on the mission-level operational analysis and functional models. Nevertheless, there is currently increasing demand for military logistics support even at the engagement level, especially for resupply using unmanned transport assets. In response to the demand, this study proposes a task model of the military logistics support for engagement-level analysis that relies on the logic of ammunition resupply below the battalion level. The model employs a decisions tree to establish the priority of resupply based on variables such as the enemy's level of threat and the remaining ammunition of the supported unit. The model's feasibility is demonstrated through a combat simulation using OneSAF.

The Relationship between National Identity and Attitudes towards Immigrants - A Comparison of Korean, Chinese and Japanese University Students (국민정체성과 다문화태도의 관계-한·중·일 대학생을 중심으로)

  • Kim, Hyun-suk;Choi, Song-sik;Kim, Hee-Jae
    • Journal of International Area Studies (JIAS)
    • /
    • v.15 no.2
    • /
    • pp.141-168
    • /
    • 2011
  • The purpose of this study was to investigate the relationship between national identity and attitudes towards immigrants among Korean, Chinese and Japanese univ. students. The subjects were univ. students of Korean(433), Chinese (495) and Japanese(477). Data were analyzed by Factor analysis, ANOVA, Scheffe, Structural Equation Modeling, multi-group analysis. The results are following : First, ethnic and civic identity both was the highest in chinese univ. students. Ethnic identity was the lowest in Korean univ. students, and civic identity was the lowest in Japanese univ. students. Second, attitudes towards immigrants among Korean, Chinese and Japanese Univ. Students differed from items of perceived threat. Third, each sub-factor of national identity influenced mutual relation rather than independent on attitude towards immigrants. The impact of national identity on the attitudes towards immigrants, that of Japanese univ. students has significantly highest, but those of Korean and Chinese univ. students was not affected.

The Effects of Franchise CEO's Innovation and CSR Passion, and Customer Orientation on Perceived Service Quality, Customer Affection, and Commitment (프랜차이즈 기업가의 혁신 열정, 사회적 책임열정, 고객 지향성이 서비스 품질, 고객애정, 그리고 몰입에 미치는 영향)

  • Han, Sang-Ho;Park, Heung-Jin
    • The Korean Journal of Franchise Management
    • /
    • v.9 no.2
    • /
    • pp.17-29
    • /
    • 2018
  • Purpose - The environment surrounding the franchise industry in recent years is a big threat to the franchise business. In this perspective, this study examines the effect of franchise CEO's Innovation, CSR Passion, and customer orientation(CO) on customers' perceived service quality(PSQ), affection, and commitments in the context of food-service franchise industry. This study suggests the guidelines on how franchisor uses their passion and customer orientation on customer to maintain and increase the commitments. Research design, data, and methodology - In order to achieve these purposes, research model and hypotheses were developed. Out of 500 respondents received through online survey, 449 respondents were used, because of 51 incomplete respondents. The data were analyzed using frequency analysis, confirmatory factor analysis, correlation analysis, and structural equational modeling with SPSS 23.0 and AMOS 23.0 statistical program. Result - The results of the study are as follows. First, innovation passion has a significant impact on PSQ and customer affection. And CSR passion have a significant impact on PSQ. Second, customer orientation has a significant impact on PSQ and customer affection. Third, PSQ has a significant impact on customer affection and sustainable commitment. Fourth, customer affection has a significant impact on behavioral commitment. Fifth, behavioral commitment has a significant impacts on sustainable commitment. Conclusions - The implications of this study are following as: Restaurants franchisor and CEOs should have a passion for innovation to continuously identify consumer needs and develop new menus and services that meet their needs. Second, franchisor and CEOs need to demonstrate the importance of creating the right environment, creating a fair business, and trying to create products in a given environment. Finally, franchisor and CEOs should demonstrate how to build relationships with customers and how to maintain positive feelings. In addition, it is necessary to appeal to the customers with enthusiasm and a customer-oriented tendency of the entrepreneur of the franchise head office in order to maintain the relationship with the customer and feelings.